Ethical hacking for computer science
-
Upload
sarath-kumar -
Category
Education
-
view
134 -
download
1
Transcript of Ethical hacking for computer science
H4CK||\|G 1$ 9OOD
23/2/2016@sarath&surenthar1
By SARATHKUMAR.K (MCA-B)
SURENDHAR.R (MCA-B)23/2/2016@sarath&surenthar
2
CONTENTS What is Ethical Hacking? Types of Hackers Sniffing Phishing Key loggers Social Engineering Conclusion
23/2/2016@sarath&surenthar3
WHAT IS HACKING? Hacking is a gain unauthorized access to
data in a system or computer. act of illegally entering a computer system,
and making unauthorized changes to the files and data contain within
Cracking : some one who destructs things.
23/2/2016@sarath&surenthar4
WHAT IS ETHICAL HACKING?Ethical Hacking is testing the resources for a good cause and for the
Betterment of technology. Learn about the system and trying to find its
weaknesses. Techniques of Criminal hackers-Detection-
Prevention Given Completely trustworthy
23/2/2016@sarath&surenthar5
TYPES OF HACKERS
BLACK HAT HACKER
GREY HAT HACKER
WHITE HAT HACKER
23/2/2016@sarath&surenthar6
WHITE HAT HACKERS
Good guys
Don’t use their skills for illegal purpose
Computer security experts and help to protect from Black hat hackers…
23/2/2016@sarath&surenthar7
BLACK HAT HACKERS
Bad guys.
Use their skills for their personnel gain
Hack banks, credit cards and defense websites.
23/2/2016@sarath&surenthar8
GREY HAT HACKERS
They are the combination of Black Hat Hackers and White Hat Hackers.
Use their skills for their personnel gain
Goal of grey hat hackers is to provide National Security.
23/2/2016@sarath&surenthar9
FEW HACKING TECHNOLOGIES
Password Cracking
SNIFFING
PHISHING
KEYLOGGERS
SOCIAL ENGINEERING
23/2/2016@sarath&surenthar10
There are many methods for cracking the password and then get in to the system.
The simplest method is to guess the password. But this is a tedious work.
In order to make this work easier there are many automated tools for password guessing
like Cain and Abel
Password Cracking
23/2/2016@sarath&surenthar11
SNIFFING
Sniffer is a program that monitor or reading all network traffic passing in and out over a network.
(Telnet, FTP, SMTP, HTTP) that all protocol are vulnerable for sniffing
Because it send data and password in clear text. Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network.
23/2/2016@sarath&surenthar12
23/2/2016@sarath&surenthar13
PHISHINGPhishing is the method used to steal personal information through spamming or other deceptive means. There are a number of different phishing techniques used to obtain personal information from users. Email / Spam
Phishers may send the same email to millions of users, requesting them to fill in personal details
Web Based Delivery Web based delivery is one of the most sophisticated phishing
techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system.
Instant Messaging Instant messaging is the method in which the user receives a message
with a link directing them to a fake phishing website 23/2/2016@sarath&surenthar14
23/2/2016@sarath&surenthar15
KEYLOGGERS Key logger is a software which records each and every
key strokes you enter, include mouse click. Loggers are two types…
Hardware keylogger Software keylogger
Hardware Keylogger This is a thumb size device it records all keystrokes we enter from keyboard, then save it in its memory. Later this data will be analyzed. Software Keylogger
Software keylogger can be installed in the victims system, it records all keystrokes we enter from keyboard and takes the screen shots and saved in the hidden path. 23/2/2016@sarath&surenthar
16
23/2/2016@sarath&surenthar17
SOCIAL ENGINEERING Social engineering is the art of manipulating people so
they give up confidential information. When individuals are targeted the criminals are usually
trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
In the security chain human is the weakest link, because they trust everyone easily.
23/2/2016@sarath&surenthar18
ADVANTAGES
Prevents website defacements.
Analyzing the weakness to find the loop holes. To improve high security
Provides security to banking and financial establishment.
To catch a thief you have to think like a thief.
DISADVANTAGES All depends upon the trustworthiness of the
ethical hacker. Hiring professionals is expensive 23/2/2016@sarath&surenthar
19
People trust security, for security purpose we need Ethical Hacking.
Ethical hacking provides results which can be used to strengthen a information technology environments security
CONCLUSION
23/2/2016@sarath&surenthar20
@sarath&surenthar
THANK YOU
@sarath&surenther